Versions Compared

Key

  • This line was added.
  • This line was removed.
  • Formatting was changed.


Info
The following steps are for RHEL/CentOS 7.x specifically.

To configure haproxy as an SSL offloader for Content Gateway, you will need the following configuration steps.

...

Code Block
openssl req -x509 -nodes -days 365 -newkey rsa:2048 -keyout $DOMAIN.key -out $DOMAIN.crt

copy Concatenate the DOMAIN.crt (first) and the DOMAIN.key (second) into a DOMAIN.pem file.

Copy the DOMAIN.pem to /etc/pki/tls/certs/selfsignedcertDOMAIN.pem

For S3 as a general rule its a good idea to make a wildcard SSL certificate too, so repeat the same step steps as above and when prompted for the "Common Name" use "*.DOMAIN" , then copy the new CRT file to /etc/pki/tls/certs/selfsignedcertDOMAIN-wildcard.pem

To add the new certificate to /etc/haproxy/haproxy.cfg change

bind 0.0.0.0:443 ssl crt /etc/pki/tls/certs/selfsignedcertselfsignedcer.pem

to

bind 0.0.0.0:443 ssl crt /etc/pki/tls/certs/selfsignedcertDOMAIN.pem crt /etc/pki/tls/certs/selfsignedcertDOMAIN-wildcard.pem

Info
Do this for all bind statements that have the ssl keyword configured. To activate restart haproxy:  systemctl restart haproxy


NOTE: If the content gateway is going to be used as the destination for a remote replication feed, the following setting must appear and be set properly in the /etc/caringo/cloudgateway/gateway.cfg file:

Code Block
[scsp]
...
...
allowSwarmAdminIP=172.30

In the example above, replicate "172.30" with the IP addresses (or prefix) of clients that will be sending administrative requests to the gateway. The most common example is the IP addresses (or prefix) of the nodes in a cluster that is using a remote replication feed with the gateway as its destination.


Info

Be aware that for Swarm UI in the configuration example above you will need to use host: <contentgatewayIP>:8091 in the login page to connect.

...

Page Properties
hiddentrue


Related issues